{"id":1494,"date":"2025-10-22T08:09:57","date_gmt":"2025-10-22T02:39:57","guid":{"rendered":"https:\/\/www.techandtrain.com\/blog\/?p=1494"},"modified":"2025-10-22T14:50:32","modified_gmt":"2025-10-22T09:20:32","slug":"cyber-security-notes-for-2025-part-4","status":"publish","type":"post","link":"https:\/\/www.techandtrain.com\/blog\/2025\/10\/cyber-security-notes-for-2025-part-4\/","title":{"rendered":"Cyber Security notes for 2025 &#8211; Part 4"},"content":{"rendered":"\n<p id=\"ember607\"><strong>Further to my four Cyber Security notes here:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.linkedin.com\/pulse\/information-security-tips-while-working-digital-sources-neil-harwani\/\">Information security tips while working with digital sources and internet | LinkedIn<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.linkedin.com\/pulse\/security-tips-google-drive-android-neil-harwani\/\">Security tips for Google Drive &amp; Android | LinkedIn<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.linkedin.com\/pulse\/facebook-privacy-security-tips-neil-harwani\/\">Facebook Privacy &amp; Security tips | LinkedIn<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.linkedin.com\/posts\/activity-7385276592912166912-6PJo\/\">Post on patterns, anti-patterns &amp; randomness in Cyber Security | LinkedIn<\/a><\/li>\n<\/ul>\n\n\n\n<p id=\"ember609\"><strong>Below I am listing Part 4 with keywords to explore relevant to 2025:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Access Control<\/li>\n\n\n\n<li>Advanced Persistent Threat (APT)<\/li>\n\n\n\n<li>AI-driven Phishing<\/li>\n\n\n\n<li>Allow-list \/ Block-list<\/li>\n\n\n\n<li>Antivirus \/ Anti-Malware Software<\/li>\n\n\n\n<li>Attack Surface<\/li>\n\n\n\n<li>Attack Vector<\/li>\n\n\n\n<li>Authentication<\/li>\n\n\n\n<li>Authenticator App<\/li>\n\n\n\n<li>Authorization<\/li>\n\n\n\n<li>Availability<\/li>\n\n\n\n<li>Backdoor<\/li>\n\n\n\n<li>Backup &amp; Recovery<\/li>\n\n\n\n<li>Behavioral Biometrics<\/li>\n\n\n\n<li>Biometric Authentication<\/li>\n\n\n\n<li>Biometrics<\/li>\n\n\n\n<li>Botnet<\/li>\n\n\n\n<li>Browser Isolation<\/li>\n\n\n\n<li>Cloud Security<\/li>\n\n\n\n<li>Confidentiality<\/li>\n\n\n\n<li>Cryptography \/ Encryption<\/li>\n\n\n\n<li>Cyber Hygiene<\/li>\n\n\n\n<li>Cyber Resilience<\/li>\n\n\n\n<li>Data Breach<\/li>\n\n\n\n<li>Data Privacy<\/li>\n\n\n\n<li>Deepfake<\/li>\n\n\n\n<li>Digital Footprint<\/li>\n\n\n\n<li>Double Extortion (Ransomware)<\/li>\n\n\n\n<li>Encryption<\/li>\n\n\n\n<li>Endpoint Protection<\/li>\n\n\n\n<li>Firewall<\/li>\n\n\n\n<li>Identity Theft<\/li>\n\n\n\n<li>Incident Response<\/li>\n\n\n\n<li>Insider Threat<\/li>\n\n\n\n<li>IoT (Internet of Things) Device<\/li>\n\n\n\n<li>IoT Security<\/li>\n\n\n\n<li>Malware (Malicious Software)<\/li>\n\n\n\n<li>Multi-factor Authentication (MFA)<\/li>\n\n\n\n<li>Multi-Factor Authentication (MFA) \/ Two-Factor Authentication (2FA)<\/li>\n\n\n\n<li>Parental Controls<\/li>\n\n\n\n<li>Patch Management<\/li>\n\n\n\n<li>Patching \/ Software Update<\/li>\n\n\n\n<li>Password Manager<\/li>\n\n\n\n<li>Passwordless Authentication<\/li>\n\n\n\n<li>Phishing<\/li>\n\n\n\n<li>Privacy Settings<\/li>\n\n\n\n<li>Quantum-safe Encryption<\/li>\n\n\n\n<li>Ransomware<\/li>\n\n\n\n<li>Safe Browsing<\/li>\n\n\n\n<li>Secure Configuration<\/li>\n\n\n\n<li>Security Control \/ Countermeasure<\/li>\n\n\n\n<li>Security Key<\/li>\n\n\n\n<li>Shoulder Surfing<\/li>\n\n\n\n<li>SIM Swapping<\/li>\n\n\n\n<li>Smishing \/ Vishing<\/li>\n\n\n\n<li>Social Engineering<\/li>\n\n\n\n<li>Spoofing<\/li>\n\n\n\n<li>Threat Actor \/ Adversary<\/li>\n\n\n\n<li>Virtual Private Network (VPN)<\/li>\n\n\n\n<li>VPN (Virtual Private Network)<\/li>\n\n\n\n<li>Vulnerability<\/li>\n\n\n\n<li>WPA3 (Wi-Fi Protected Access 3)<\/li>\n\n\n\n<li>Zero Trust<\/li>\n\n\n\n<li>Zero Trust (Principle)<\/li>\n\n\n\n<li>Zero-Day<\/li>\n\n\n\n<li>Zero-Day Exploit<\/li>\n<\/ul>\n\n\n\n<p id=\"ember611\">Note: Enhanced \/ compiled with help of AI \/ LLMs<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Email me: <a href=\"mailto:Neil@HarwaniSytems.in\"><strong>Neil@HarwaniSytems.in<\/strong><\/a><\/li>\n\n\n\n<li>Website: <a href=\"http:\/\/www.harwanisystems.in\/\"><strong>www.HarwaniSystems.in<\/strong><\/a><\/li>\n\n\n\n<li>Blog: <a href=\"http:\/\/www.techandtrain.com\/blog\"><strong>www.TechAndTrain.com\/blog<\/strong><\/a><\/li>\n\n\n\n<li>LinkedIn: <a href=\"https:\/\/www.linkedin.com\/in\/neil27\/\"><strong>Neil Harwani | LinkedIn<\/strong><\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Further to my four Cyber Security notes here: Below I am listing Part 4 with keywords to explore relevant to [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1495,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"nf_dc_page":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"everybody","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[40],"tags":[444,61,193,445],"class_list":["post-1494","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-444","tag-cyber-security","tag-keywords","tag-notes"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/10\/CyberSecurity5.jpg?fit=1280%2C1280&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7do02-o6","jetpack-related-posts":[{"id":1266,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/06\/keywords-from-day-3-4-of-online-workshop-on-development-and-deployment-of-aiot-based-solution-for-industrial-applications-by-nsut-delhi\/","url_meta":{"origin":1494,"position":0},"title":"Keywords from Day 3 &amp; 4 of Online Workshop on Development and Deployment of AIoT based solution for Industrial Applications by NSUT, Delhi","author":"Neil Harwani","date":"June 20, 2024","format":false,"excerpt":"Further to Day 1 & 2 keywords given here: Keywords from Day 1 & 2 of Online Workshop on Development and Deployment of AIoT based solution for Industrial Applications by NSUT, Delhi | LinkedIn, here are the keywords and details for Day 3 & 4 below: Day 3: Speakers: Swagatam\u2026","rel":"","context":"In &quot;AIoT&quot;","block_context":{"text":"AIoT","link":"https:\/\/www.techandtrain.com\/blog\/category\/aiot\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1242,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/04\/cyber-security-tips-for-portals-generated-by-chatgpt-gemini-part-1\/","url_meta":{"origin":1494,"position":1},"title":"Cyber security tips for Portals &#8211; Generated by ChatGPT &amp; GEMINI &#8211; Part 1","author":"Neil Harwani","date":"April 8, 2024","format":false,"excerpt":"Cyber security is a critical concern for portal applications, which often serve as gateways to a wide range of resources and services. Here are some vital tips to enhance the cyber security posture of portal applications: 1. Use Strong Authentication Mechanisms: Implement multi-factor authentication (MFA) to add an extra layer\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/04\/CyberSecurity.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1397,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/01\/list-of-vulnerability-databases\/","url_meta":{"origin":1494,"position":2},"title":"List of vulnerability databases","author":"Neil Harwani","date":"January 3, 2025","format":false,"excerpt":"Vulnerability databases are used by variety of companies \/ entities to solidify their defenses in cyber world. Here is a list of vulnerability databases in prime use by various entities that I could find. https:\/\/nvd.nist.gov\/ https:\/\/www.exploit-db.com\/ https:\/\/msrc.microsoft.com\/ https:\/\/ubuntu.com\/security\/notices https:\/\/github.com\/advisories https:\/\/vulners.com\/ https:\/\/owasp.org\/ https:\/\/www.kb.cert.org\/vuls\/ https:\/\/www.cisa.gov\/ https:\/\/www.cisa.gov\/topics\/industrial-control-systems https:\/\/security.snyk.io\/ https:\/\/access.redhat.com\/security\/ https:\/\/cve.mitre.org\/ Email me: Neil@HarwaniSytems.in\u2026","rel":"","context":"In &quot;Cyber Security&quot;","block_context":{"text":"Cyber Security","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-security\/"},"img":{"alt_text":"Credits: www.pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Vulnerability.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Vulnerability.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Vulnerability.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Vulnerability.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/01\/Vulnerability.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1380,"url":"https:\/\/www.techandtrain.com\/blog\/2024\/11\/web-portal-commerce-cyber-forensics\/","url_meta":{"origin":1494,"position":3},"title":"Web portal &amp; commerce cyber forensics","author":"Neil Harwani","date":"November 24, 2024","format":false,"excerpt":"For this discussion, we will refer the top open-source products like Liferay, Drupal, WordPress, etc. and one proprietary portal like SharePoint which has good documentation. Home - Liferay WordPress.com: Build a Site, Sell Your Stuff, Start a Blog & More Drupal - Open Source CMS | Drupal.org Microsoft SharePoint Online\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Credits: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2024\/11\/interface.png?fit=1200%2C801&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1432,"url":"https:\/\/www.techandtrain.com\/blog\/2025\/03\/cybersecurity-and-cyber-forensic-tools-part-1-collated-from-internet-ai\/","url_meta":{"origin":1494,"position":4},"title":"Cybersecurity and Cyber Forensics tools &#8211; Part 1 (Collated from internet &amp; AI)","author":"Neil Harwani","date":"March 7, 2025","format":false,"excerpt":"Here is an exhaustive list of cybersecurity and cyber forensic tools, categorized based on their functionalities: 1. Network Security & Monitoring Tools Wireshark \u2013 Network packet analyzer Snort \u2013 Open-source network intrusion detection system (NIDS) Suricata \u2013 High-performance IDS, IPS, and network security monitoring (NSM) Zeek (formerly Bro) \u2013 Network\u2026","rel":"","context":"In &quot;Cyber Forensics&quot;","block_context":{"text":"Cyber Forensics","link":"https:\/\/www.techandtrain.com\/blog\/category\/cyber-forensics\/"},"img":{"alt_text":"Image Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2025\/03\/CyberSecurityAndForensics.jpg?fit=1200%2C713&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1049,"url":"https:\/\/www.techandtrain.com\/blog\/2023\/03\/security-best-practice-patterns-architecture-links-from-aws-gcp-azure-part-1\/","url_meta":{"origin":1494,"position":5},"title":"Security best practice, patterns &amp; architecture links from AWS, GCP &amp; Azure &#8211; Part 1","author":"Neil Harwani","date":"March 19, 2023","format":false,"excerpt":"Herewith I am providing a curated list of links for security best practices, patterns & architecture for AWS, GCP & Azure - Part 1. AWS: Security - AWS Well-Architected Framework (amazon.com) AWS Security Reference Architecture (AWS SRA) - AWS Prescriptive Guidance (amazon.com) AWS Security Documentation (amazon.com) Security, identity, compliance -\u2026","rel":"","context":"In &quot;Architecture&quot;","block_context":{"text":"Architecture","link":"https:\/\/www.techandtrain.com\/blog\/category\/architecture\/"},"img":{"alt_text":"Credit: www.Pixabay.com","src":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.techandtrain.com\/blog\/wp-content\/uploads\/2023\/03\/Cloud.png?fit=1200%2C828&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1494","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/comments?post=1494"}],"version-history":[{"count":2,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1494\/revisions"}],"predecessor-version":[{"id":1502,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/posts\/1494\/revisions\/1502"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media\/1495"}],"wp:attachment":[{"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/media?parent=1494"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/categories?post=1494"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techandtrain.com\/blog\/wp-json\/wp\/v2\/tags?post=1494"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}